Category Archives: Newsletter

Secure your G-mail

G-Mail has been one of the largest email provider since 2012, when the number of active users were greater than Hotmail. Gmail had 425 million (estimate) users in the year 2012.

The point we need to think about now is security think about it : Your bank account, social media, work life, personal messages — they’re all tied back to your email account. You are not willing to access your account by some one. Now you can secure your account by taking every measure available to protect your email account, follow the given instruction below.

1.Enable 2-Step Verfication

This is the very important step to be taken to secure your account. If two-factor authentication is an option were you need to enable it. If someone gets details of your email address and password, they still can’t access your account from an unauthorized device without a verification code. You can set this code to be sent to your mobile phone or via a voice call to a phone line, and unless the thief has access to that phone, he or she can’t get the code. You can also set a backup number, in the event you lose access to your primary phone as well.

2. Monitor Your Recent Activity

Using this option you can see the logs of your account who has accessed your account and from which devices. If you feel that the logs doesn’t match your usage history, it may be a sign of your account that has been compromised and you should change your password soon.

3. Check Your Settings

In Gmail inbox you will see a little gear icon in the right top corner where you can go and check your settings. You should review your settings tab and make sure everything looks normal. Specifically, you should look at your filters and forwarding settings, because if you see any filters or forwarding addresses you didn’t add, someone may have hacked and configured your account to send messages to another email address.

Think about all the things that come into your inbox: password reset links, financial updates, personal messages, sensitive work matters, and plenty of other things you want to keep private.

4. Review Account Permissions

When you sign up for a new app or service, you are sometimes allowed to authorize access to your basic email information or email contacts. You should authorize third-party applications with caution, and it’s good to review a list of approved services to eliminate any unnecessary information sharing. You can check account permissions through your Google Account settings.

For a step-by-step tip sheet on keeping your Gmail secure, visit Google’s security checklist and make sure you’re making the most of their security options.

Few Important Tips :-

Use a unique, difficult-to-guess password to protect your account.
Update your account regularly especially when you have reason to be concerned your account has been compromised.
Don’t leave your account logged in on a computer or device someone else can easily access, and protect your personal devices with pass codes to further deter unauthorized email access.

orginal article:

2 New versions of Ransomware discovered!

#1 OphionLocker

The first one is a new strain of ransomware named OphionLocker. It encrypts your data using strong open source Crypto++ Elliptical Curve Cryptography and then ransoms the files for about 1 Bitcoin. The infection vector is limited to hacked websites, utilizing exploit kits that hack into unpatched computers. The ransom amount varies between countries where the victim is located, with the U.S. having the highest rates

A new wrinkle is that when a workstation is infected with OphionLocker, it will generate a unique hardware ID based on the serial number of the first hard drive, the motherboard’s serial number, and other information. It will then contact the malware’s Control & Command server via TOR site and check if this particular hardware ID has been encrypted already. When you go to the ransomware site, it will prompt you to enter your hardware id. Once entered it will display the amount of ransom you are required to pay and provide a bitcoin address that you should send the payment to.

The good news: This ransomware does not (yet) securely delete your files or remove the shadow volume copies. Therefore it is possible to recover your files using a file recovery tool or a program like Shadow Explorer. For more information on how to do this, please see this section in the CryptoLocker guide over at BleepingComputer.

#2 TorrentLocker

The cybercrime gang behind TorrentLocker, a fast-growing strain of ransomware has earned $40 million between March and December 2014. Researchers from IT security company ESET have tracked the Bitcoin wallet that received the ransom payments, and since March a whopping 82,000 Bitcoins have been paid to that wallet.

TorrentLocker was first uncovered in August by iSight Partners and was seen to be using phishing attacks targeting the UK and Australia, but has since expanded its reach to target more countries including Italy, Czech Republic, Germany, and Turkey. It looks this is another eastern European cyber gang that is getting ready for their assault on the U.S.

From ESET’s main office in Bratislava, malware researcher Robert Lipovsky said that the TorrentLocker was sophisticated with the cryptography aspect of the malware “done quite well”, using AES with 256-bit keys, and those keys are stored on a remote sever meaning there is no way of decrypting the victim’s files like CryptoWall. ESET plans to publish an extensive report on the development of TorrentLocker next week.

The message is patch your systems diligently, be religious about Backup/Restore and step your users through effective security awareness training to make sure they don’t fall for social engineering tricks. Find out how affordable this is for your organization today.

Article from SpiceWorks by Stu Sjouwerman.